Russian, Chinese APTs Exploit WinRAR Flaw as Microsoft Issues Emergency Office Zero-Day Patch; Fortinet Blocks Active FortiCloud SSO Attacks
Critical Infrastructure Intelligence Briefing
Date: Wednesday, January 28, 2026
Reporting Period: January 21-28, 2026
1. Executive Summary
This week's threat landscape is dominated by active exploitation of multiple critical vulnerabilities affecting enterprise software widely deployed across critical infrastructure sectors. The convergence of nation-state and cybercriminal exploitation of these flaws demands immediate attention from infrastructure operators.
Major Developments:
- Active Zero-Day Exploitation: Microsoft issued an emergency out-of-band patch for CVE-2026-21509, a high-severity Office zero-day under active exploitation. Fortinet has confirmed active exploitation of CVE-2026-24858, a critical FortiCloud SSO authentication bypass, and has implemented mitigations while patches are being finalized.
- Nation-State Convergence on WinRAR Flaw: Russian and Chinese state-sponsored threat actors, alongside financially motivated cybercriminals, continue exploiting CVE-2025-8088 in WinRAR—a vulnerability first disclosed six months ago—targeting military, government, and technology sectors for espionage and initial access.
- Supply Chain Security Concerns: Critical vulnerabilities in the JavaScript ecosystem ("PackageGate") and a new sandbox escape in Grist-Core highlight ongoing risks to software supply chains affecting operational technology and enterprise environments.
- Financial Sector Alert: 77% of financial service organizations accumulated security debt in 2025, creating systemic vulnerabilities. A massive ATM jackpotting operation has resulted in 87 total indictments, with 31 new defendants charged this week.
- Post-Quantum Transition: CISA released a technology readiness list for post-quantum cryptography, though security experts caution that most products and backend protocols remain unprepared for the transition.
Immediate Actions Required:
- Apply Microsoft Office emergency patch for CVE-2026-21509 immediately
- Verify Fortinet FortiCloud configurations and monitor for unauthorized access
- Update WinRAR to latest version and audit systems for indicators of compromise
- Review OpenSSL deployments for 12 newly patched vulnerabilities including high-severity RCE
2. Threat Landscape
Nation-State Threat Actor Activities
Russian and Chinese APT Exploitation of WinRAR (CVE-2025-8088)
Multiple nation-state groups have been actively exploiting a high-severity path traversal vulnerability in WinRAR since July 2025. According to SecurityWeek and CyberScoop, both Russian and Chinese state-sponsored actors are leveraging this flaw for initial access against military, government, and technology sector targets.
- Attribution: Multiple APT groups confirmed; specific group names withheld pending further analysis
- Targets: Military installations, government agencies, technology companies
- Objective: Espionage and persistent access
- Assessment: The six-month exploitation window indicates many organizations have failed to patch despite available updates
China-Linked Mustang Panda Updates CoolClient Backdoor
The Chinese espionage group Mustang Panda has deployed an updated variant of its CoolClient backdoor with enhanced capabilities for stealing browser login credentials and monitoring clipboard activity, per Bleeping Computer.
- New Capabilities: Browser credential theft, clipboard monitoring
- Sectors at Risk: Government, defense, telecommunications
PeckBirdy C2 Framework Linked to China-Aligned Operations
Researchers have identified a JScript-based command-and-control framework called PeckBirdy, in use by China-aligned APT actors since 2023. The framework has targeted gambling and government sectors across Asia, according to The Hacker News and Infosecurity Magazine.
Pakistan-Linked Campaigns Target Indian Government
Two distinct cyber campaigns, codenamed "Gopher," have been attributed to Pakistan-based threat actors targeting Indian government entities using previously undocumented tradecraft, as reported by The Hacker News.
Ransomware and Cybercriminal Developments
World Leaks Ransomware Group Claims Nike Breach
The World Leaks ransomware group has leaked 1.4 TB of files allegedly stolen from Nike. The sportswear company has confirmed it is investigating a "potential cyber security incident," per Bleeping Computer and Homeland Security Today.
- Impact: Potential exposure of corporate data, supply chain information, and customer data
- Relevance: Demonstrates continued evolution of extortion tactics beyond encryption
ShinyHunters Vishing Campaign Targets 100+ Organizations
A sophisticated voice phishing (vishing) campaign attributed to ShinyHunters is targeting single sign-on (SSO) services to gain network access and steal data. Over 100 organizations have been targeted, including Atlassian, Canva, Epic Games, HubSpot, Moderna, ZoomInfo, and WeWork, according to SecurityWeek and CyberScoop.
- Technique: Real-time vishing attacks combined with fake CAPTCHAs
- Target: SSO credentials for enterprise network access
- Critical Infrastructure Relevance: Healthcare (Moderna) and technology providers serving multiple sectors
ATM Jackpotting Operation Expands
Federal prosecutors have charged 31 additional defendants in connection with a massive ATM jackpotting scheme, bringing the total to 87 individuals charged. The operation is allegedly linked to the Venezuelan gang Tren de Aragua, per SecurityWeek and Bleeping Computer.
Malicious Chrome Extensions Steal ChatGPT Sessions
Browser extensions marketed as ChatGPT enhancement tools have been discovered stealing user session data, enabling threat actors to access victims' ChatGPT conversations and data, according to SecurityWeek.
"Stanley" MaaS Guarantees Malicious Chrome Extensions
A new malware-as-a-service platform called "Stanley" promises to help threat actors create malicious Chrome extensions capable of bypassing Google's review process, per Bleeping Computer.
Emerging Attack Vectors
ClickFix Attacks Combine Fake CAPTCHAs with Signed Microsoft Scripts
A new campaign combines ClickFix-style fake CAPTCHAs with signed Microsoft Application Virtualization (App-V) scripts to distribute information-stealing malware, as detailed by The Hacker News.
AI-Powered Polymorphic Phishing Attacks
Researchers have identified AI-powered polymorphic attacks that dynamically generate phishing content to evade detection, per CSO Online.
3. Sector-Specific Analysis
Energy Sector
Threat Level: ELEVATED
Cyber-Physical Systems Security Gap Addressed
Indurex, a new cybersecurity startup founded by former Applied Risk leader Jalal Bouhdada, has emerged from stealth to address security gaps in cyber-physical systems, according to SecurityWeek. This development highlights ongoing concerns about OT/IT convergence security in energy infrastructure.
Relevance to Energy Sector:
- WinRAR exploitation campaigns may target energy sector engineering workstations
- FortiCloud SSO bypass could affect energy companies using Fortinet for network security
- Supply chain vulnerabilities in npm/yarn affect SCADA web interfaces and monitoring dashboards
Water & Wastewater Systems
Threat Level: MODERATE
While no sector-specific incidents were reported this week, water utilities should note:
- OpenSSL vulnerabilities may affect water system monitoring and control interfaces
- Fortinet devices commonly deployed in water utility networks require immediate attention
- The Grist-Core vulnerability could affect utilities using spreadsheet-based data management
Communications & Information Technology
Threat Level: HIGH
SoundCloud Data Breach Impacts 29.8 Million Accounts
Have I Been Pwned has added a SoundCloud breach affecting nearly 30 million user accounts, per Bleeping Computer.
SmarterMail Servers Exposed
Over 6,000 SmarterMail servers remain exposed online and vulnerable to automated hijacking attacks exploiting a critical authentication bypass, according to Bleeping Computer.
vm2 NodeJS Sandbox Escape
A critical sandbox escape vulnerability (CVE-2026-22709) in the vm2 Node.js library allows arbitrary code execution on host systems, per Bleeping Computer.
WhatsApp Introduces Strict Account Settings
Meta has released "Strict Account Settings" for WhatsApp, providing lockdown-style security for users at elevated risk of spyware attacks, according to The Hacker News and CyberScoop.
Transportation Systems
Threat Level: MODERATE
TSA Biometric Data Collection Revision
TSA has announced intentions to revise its biometric data collection practices, per Homeland Security Today. Transportation sector operators should monitor for updated guidance.
Maritime Security Enhancement
DHS Science & Technology has announced enhanced critical infrastructure protection through the Ammonia Port Preparedness and Emergency Response program, according to Homeland Security Today.
Healthcare & Public Health
Threat Level: ELEVATED
Moderna Among ShinyHunters Targets
Healthcare company Moderna appears among the targets in the ShinyHunters vishing campaign, highlighting continued threat actor interest in pharmaceutical and healthcare organizations.
Privacy and GenAI Concerns
Security Magazine reports that generative AI is raising the stakes for privacy and security integration, particularly relevant for healthcare organizations handling protected health information, per Security Magazine.
Financial Services
Threat Level: HIGH
77% of Financial Organizations Accumulated Security Debt
A concerning report indicates that 77% of financial service organizations accrued security debt in 2025, creating systemic vulnerabilities across the sector, according to Security Magazine.
ATM Jackpotting Threat Continues
The expanded indictments in the ATM jackpotting case underscore ongoing physical and cyber threats to financial infrastructure.
Always-On Privileged Access Risks
CSO Online reports that always-on privileged access remains pervasive in financial services and is fraught with risks, per CSO Online.
4. Vulnerability & Mitigation Updates
Critical Vulnerabilities Requiring Immediate Attention
| CVE | Product | Severity | Status | Action Required |
|---|---|---|---|---|
| CVE-2026-24858 | Fortinet FortiCloud SSO | Critical | Active Exploitation | Apply mitigations; monitor for patches |
| CVE-2026-21509 | Microsoft Office | High | Active Exploitation | Apply emergency patch immediately |
| CVE-2025-8088 | WinRAR | High | Active Exploitation | Update to latest version |
| CVE-2026-22709 | vm2 NodeJS Library | Critical | Patch Available | Update immediately |
| Multiple CVEs | OpenSSL | High | Patches Available | Update to patched versions |
| Grist-Core RCE | Grist-Core Spreadsheet | Critical | Patch Available | Update immediately |
Detailed Vulnerability Analysis
Fortinet FortiCloud SSO Authentication Bypass (CVE-2026-24858)
Source: SecurityWeek, The Hacker News, Bleeping Computer
- Impact: Allows attackers to log into devices registered to other FortiCloud accounts
- Exploitation Status: Confirmed active exploitation in the wild
- Mitigation: Fortinet has implemented server-side mitigations; patches forthcoming
- Recommended Actions:
- Review FortiCloud account access logs for unauthorized activity
- Implement additional authentication controls where possible
- Monitor Fortinet advisories for patch release
Microsoft Office Zero-Day (CVE-2026-21509)
Source: The Hacker News, CSO Online, Infosecurity Magazine
- Affected Products: Microsoft Office 2016 and 2019
- CVSS Score: High severity
- Exploitation Status: Active exploitation confirmed
- Recommended Actions:
- Apply out-of-band patch immediately
- Enable Protected View for Office documents from untrusted sources
- Block Office file types at email gateways where feasible
OpenSSL Multiple Vulnerabilities
Source: SecurityWeek
- Total Vulnerabilities: 12 flaws patched
- Most Severe: High-severity remote code execution
- Discovery: All vulnerabilities discovered by a single cybersecurity firm
- Critical Infrastructure Impact: OpenSSL is widely deployed in SCADA systems, industrial control systems, and enterprise infrastructure
PackageGate - NPM/Yarn Supply Chain Vulnerabilities
Source: SecurityWeek, CSO Online
- Impact: Bypasses protections against supply chain attacks, enabling arbitrary code execution
- Affected Systems: Any application using npm or yarn package managers
- Critical Infrastructure Relevance: Web-based SCADA interfaces, monitoring dashboards, and enterprise applications
Grist-Core Sandbox Escape
Source: The Hacker News, Infosecurity Magazine
- Impact: Remote code execution via malicious spreadsheet formulas
- Attack Vector: Pyodide sandbox escape
- Recommended Action: Update Grist-Core installations immediately; audit for unauthorized formula execution
5. Resilience & Continuity Planning
Lessons Learned
WinRAR Exploitation Highlights Patch Management Gaps
The continued exploitation of CVE-2025-8088 six months after disclosure demonstrates that many organizations still struggle with timely patching of common desktop applications. Infrastructure operators should:
- Include archive utilities in vulnerability management programs
- Implement application whitelisting where feasible
- Consider enterprise deployment tools for consistent patching
SSO as Single Point of Failure
The ShinyHunters vishing campaign and FortiCloud SSO bypass highlight risks associated with centralized authentication:
- Implement phishing-resistant MFA (FIDO2/WebAuthn) for SSO systems
- Deploy behavioral analytics to detect anomalous authentication patterns
- Establish out-of-band verification procedures for sensitive access requests
Supply Chain Security Developments
JavaScript Ecosystem Vulnerabilities
The PackageGate vulnerabilities underscore the need for:
- Software Bill of Materials (SBOM) for all deployed applications
- Dependency scanning in CI/CD pipelines
- Vendor security assessments for third-party software
Cross-Sector Dependencies
Fortinet Deployment Across Sectors
The FortiCloud SSO vulnerability affects organizations across all critical infrastructure sectors. Cascading impacts may include:
- Compromised network segmentation between IT and OT environments
- Unauthorized access to remote management interfaces
- Potential pivot points for lateral movement
Public-Private Coordination
IAEM-USA Emergency Management Survey
The International Association of Emergency Managers (IAEM-USA) has launched an Emergency Management Performance Grant Survey to assess local and tribal preparedness funding needs, per Homeland Security Today. Infrastructure operators are encouraged to participate.
6. Regulatory & Policy Developments
Federal Guidelines and Initiatives
CISA Post-Quantum Cryptography Technology Readiness List
Source: CyberScoop, CSO Online
CISA has published guidance to help technology buyers navigate the transition to post-quantum encryption. Key points:
- Purpose: Assist agencies in identifying quantum-resistant products
- Expert Caution: Most products and backend internet protocols have yet to be updated
- Recommended Actions:
- Inventory cryptographic assets and dependencies
- Prioritize systems handling long-lived sensitive data
- Engage vendors on post-quantum migration roadmaps
NIST Secure Hardware Standards Initiative
Source: NIST
NIST has announced the SUSHI@NIST initiative to enhance hardware security standards for national defense and emerging technologies. This addresses:
- Geopolitical semiconductor supply chain concerns
- Digital sovereignty requirements
- Hardware-level security for critical systems
TSA Biometric Data Collection Revisions
TSA's announced intention to revise biometric data collection practices may affect transportation sector operators and security integrators.
International Developments
UK Counterterrorism Operations
UK terror police have revealed they stopped 19 "late-stage" attack plots over the past five years, per Homeland Security Today. This underscores the persistent physical threat environment affecting allied nations.
Legal and Judicial Developments
Supreme Court Considers Geofence Warrant Constitutionality
The US Supreme Court is considering the constitutionality of geofence warrants, per Schneier on Security. This case may have implications for law enforcement access to location data during infrastructure security investigations.
GAO Report on Terrorist Watchlist
The Government Accountability Office has released recommendations for improving terrorist watchlist awareness, reporting, and redress processes, according to Homeland Security Today.
7. Training & Resource Spotlight
New Tools and Frameworks
Indurex Cyber-Physical Systems Security Platform
Indurex has emerged from stealth with solutions designed to close security gaps in cyber-physical systems. Founded by Jalal Bouhdada (formerly of Applied Risk), the company focuses on industrial cybersecurity challenges relevant to critical infrastructure operators.
Memcyco Anti-Impersonation Technology
Memcyco has raised $37 million to expand its agentless anti-impersonation platform, per SecurityWeek. The technology may help organizations combat brand impersonation attacks targeting customers and employees.
LevelBlue Acquires Alert Logic MDR
LevelBlue has acquired Alert Logic's managed detection and response services from Fortra, per CyberScoop. MDR customers should monitor for service transition communications.
Best Practices and Guidance
CISO Skills for 2026
CSO Online has published guidance on skills CISOs need to master in 2026, including managing AI-related risks and overcoming "AI fatigue," per CSO Online.
Executive Protection Planning
This briefing is generated using AI analysis of public news sources. Always verify critical information through authoritative sources before taking action.